Guard Against DoS with Embryonic Connection Limits

  • 5 July 2016
  • Author: Anonym
  • Number of views: 961
  • 0 Comments
Guard Against DoS with Embryonic Connection Limits
One strategy for preventing denial-of-Service (DoS) attacks is to limit the number of embryonic connections. These are TCP connections where the handshake hasn't been completed yet. DoS attacks may attempt to flood an interface with TCP SYN packets, initiating the handshake but not completing it.

Centralize Access Point Administration

  • 5 July 2016
  • Author: Anonym
  • Number of views: 861
  • 0 Comments
Centralize Access Point Administration
Configuring multiple access points individually can be tedious and error-prone. To centralize administration, some access points have a cluster option, so that one configuration applies to all APs.

Three top IOS Commands to Foil Dictionary and Brute Force Attacks

  • 28 June 2016
  • Author: Anonym
  • Number of views: 725
  • 0 Comments
Three top IOS Commands to Foil Dictionary and Brute Force Attacks
With advanced dictionary and brute force attack techniques, hackers may be able to break into your network through repeated login attempts. Cisco IOS contains a number of commands to help you keep the hackers at bay, while also allowing legitimate users to retry logging in if they failed due to a typo or brief memory lapse. Here are three of the most useful commands for this purpose:

Apply this Hotfix for Dropped DHCP Reservations

  • 28 June 2016
  • Author: Anonym
  • Number of views: 818
  • 0 Comments
Apply this Hotfix for Dropped DHCP Reservations
If your IP address reservations are mysteriously dropped by your DHCP server, check if you have Windows Server 2008 R2. There's a known bug that can cause this Windows version to delete DHCP reservations when it shouldn't.

Two Ways to Better Organize your ACLs

  • 21 June 2016
  • Author: Anonym
  • Number of views: 809
  • 0 Comments
Two Ways to Better Organize your ACLs
Configurations involving access control lists can get easily get cluttered, so it's useful to keep your ACLs organized and know which ones are actually being used. You can figure out the latter by pasting the running config for your network device into a text editor and searching for your ACLs (or writing a script to automate the search).

Gain a Heads-Up Regarding a Futuristic Solution

  • 21 June 2016
  • Author: Anonym
  • Number of views: 827
  • 0 Comments
Gain a Heads-Up Regarding a Futuristic Solution
One of the problems with data encryption is that it usually causes the data to take up a lot more storage space. This can pose a problem particularly in applications (such as ones for cloud-based storage) that need to handle encrypted IP addresses or other short pieces of data. Because IP addresses are shorter than the blocks used in standard encryption schemes, encrypting them tends to be very inefficient from a storage perspective.

The IoT'S Future Looks Bright, Both for Businesses & Consumers

  • 16 June 2016
  • Author: Anonym
  • Number of views: 1462
  • 0 Comments
The IoT'S Future Looks Bright, Both for Businesses & Consumers

As the internet's usefulness continues to become more apparent every day, it's no surprise that so many companies are working tirelessly to give their products a connection. Everything from toasters to manufacturing equipment can be given internet access, a trend that's been named the Internet of Things. What's more, the connected devices within this movement are rapidly increasing in popularity. 


Improve Manageability with Network Objects

  • 13 June 2016
  • Author: Anonym
  • Number of views: 869
  • 0 Comments
Improve Manageability with Network Objects
Managing the permissions and rules for resources on the network can be a complex task when you need to make changes. Fortunately, network objects simplify administration by allowing you to group several related resources into one "object." Rules can then be set for the object as a whole. Any change to the settings for the object automatically applies to its members, thus eliminating the need for separate configuration changes to each network resource. Also, by giving network objects logical and understandable names, you can make it easier for new IT staff to learn the network architecture more quickly.
RSS
12345678

Categories